indetectables-net / teorias-numeradasLinks
Mirror de las teorias numeradas del sitio de Narvaja
☆21Updated 4 months ago
Alternatives and similar repositories for teorias-numeradas
Users that are interested in teorias-numeradas are comparing it to the libraries listed below
Sorting:
- Conjunto de manuales para reversa/analisis/cracking☆63Updated 3 years ago
- RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS☆38Updated last year
- Go shellcode loader that combines multiple evasion techniques☆382Updated 2 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆286Updated 5 months ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆373Updated last year
- Extract C2 Traffic☆251Updated 10 months ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆265Updated 2 years ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆53Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆249Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆96Updated 2 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆126Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆178Updated 3 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated 2 years ago
- Execute shellcode files with rundll32☆207Updated last year
- Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.☆300Updated last year
- A Tool that aims to evade av with binary padding☆155Updated last year
- ☆165Updated last year
- Windows LPE☆131Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)☆90Updated last year
- CobaltStrike 4.8 Cracked☆64Updated 2 years ago
- A keygen for Specter Insight C2☆35Updated 7 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- 「🛡️」AVs/EDRs Evasion tool☆103Updated 10 months ago
- Awesome AV/EDR/XDR Bypass Tips☆280Updated 2 years ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆159Updated last year
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆300Updated last year
- A Linux persistence tool!☆157Updated 3 weeks ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆325Updated 4 months ago
- COM ViewLogger — new malware keylogging technique☆395Updated 9 months ago